Cyber Security Forum

Cyber Security Forum (https://cybsec.info/index.php)
-   Tutorials (https://cybsec.info/forumdisplay.php?f=49)
-   -   Bypassing SQLiRFILFI and XSS filters (https://cybsec.info/showthread.php?t=402)

Cartographer 08-31-2013 05:51 PM

Bypassing SQLiRFILFI and XSS filters
 
Okay, so most of you who have hacked a bit sure have noticed that sometimes you get 406 not acceptable... That means they got a filter that looks for hack attepts, this can be done in a php script, packet sniffer, apache, everywhere...

Anyway, the trick to bypass these is upercase-lovercase, becouse A is not the same as a...

A filter might detect words like union, select, all, 1,2,3 in a url or form post... But what about UnIoN? Exactly, if the developer of the filter have not fixed so it compares after both sides have been lovercased or uppercased the site is still vuln..

This goes for xss,rfi,lfi,sql etc etc etc

xss;
<script>awdawdwd

RFI;
HtTP://wWw

LFI;
../../../EtC/PaSsWd <- lfi is a bit tricky to bypass becouse of the ../

SQL;
UnIoN AlL SeLeCt 1 , 2 , 3 , 4

Not mine tutorial
credits to original author "Volume"


All times are GMT. The time now is 12:13 PM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
vB.Sponsors

Cybe security forum, cyber site forum, cyber forum, vendor, emv software, emv chip writer, cyber tutorial, online shop